Wireless Access - Accompanying the current Internet revolution, the wireless revolution is also having a profound impact on the way people work and live. Today, more people in Europe have a mobile phone than a PC or a car. |
|
Business Related Topics...
Computer Related Topics...
Entertainment, Recreation & Sports Related Topics...
Health & Fitness Related Topics...
Home & Family Related Topics...
Shopping Related Topics...
Would you like to submit articles to our site? Have a question or a problem?
You are here: DIME Home > Programming and Scripting > Wireless Access
Accompanying the current Internet revolution, the wireless revolution is also having a profound impact on the way people work and live. Today, more people in Europe have a mobile phone than a PC or a car.
Author: Imran Rashid
Date: Dec 6, 2009 - 10:53:17 AM
Accompanying
the current Internet revolution, the wireless revolution is also having
a profound impact on the way people work and live. Today, more people
in Europe have a mobile phone than a PC or a car. And the wireless
trend is continuing with many analysts predicting that wireless (and
often mobile) handheld devices -- such as mobile phones
and PDAs--.will overtake wired computers as the dominant Internet
access devices throughout the world. Today, there are two common types
of wireless Internet access. In a wireless LAN, wireless users
transmit/receive packets to/from a base station (also known as a
wireless access point) within a radius of a few tens of meters. The
base station is typically connected to the wired Internet and thus
serves to connect wireless users to the wired network. In wide-area
wireless access networks, packets are transmitted over the same
wireless infrastructure used for cellular telephony, with the base
station thus being managed by a telecommunications provider. This
provides wireless access to users within a radius of tens of kilometers
of the base station.
Wireless LANs, based on IEE 802.11 technology (also known as wireless
Ethernet and WiFi), are currently enjoying widespread deployment in
university departments, business offices, cafes, and homes. Many
universities install IEEE 802.11 base stations across their campuses,
allowing students to send and receive e-mail or surf the Web from
anywhere on campus (for example, library, dorm room, classroom, or
outdoor campus bench). In many cities, one can stand on a street corner
and be within range of ten or twenty base stations (for a browse able
global map of 802.11 base stations that have been discovered and logged
on a Web site by people who take great enjoyment in doing such things,
see [wiggle.net 20071). The most commonly deployed 802.11 technology.
Today many homes are combining broadband residential access (that is, cable modems or DSL) with inexpensive wireless LAN technology
to create powerful home networks. This home network consists of a
roaming laptop as well as a wired PC; a base station (the wireless
access point), which communicates with the wireless PC;
a cable modem, providing broadband access to the Internet; and a
router, which interconnects the base station and the stationary PC With
the cable modem. This network allows household members to have
broadband access to the Internet, with one member roaming from the
kitchen to the backyard to the bedrooms. The total fixed cost for such
a network is less than $150 (including the cable/DSL modem). When you
access the Internet through wireless LAN technology, you typically need
to be within a few tens of meters of a base station. This is feasible
for home access, coffee shop access, and, more generally, access within
and around a building. But what if you are on the beach or in your car
and you need Internet access? For such wide-area access, roaming
Internet users make use of the cellular phone
infrastructure, accessing base stations that are up to tens of
kilometers away. Conceptually, this is similar to a home user with a
dial-up connection to the Internet over a wired telephone line, except
that now the cellular telephony infrastructure, rather than the wired
telephony infrastructure, is used.
Imran Rashid has working knowledge about windows operating systems.For more information visit
Free CCNA Tests
Free Windows Tutorials
HTML5 - The End of PSD to HTML Slicing Providers?Oct 18, 2010 - 11:20:32 AM In 2009 the World Wide Web Consortium (W3C) decided to concentrate their efforts on HTML5, a new revision of HTML, rather than XHTML2. HTML5 is strongly supported by Apple, Opera, Mozilla, Microsoft, Google and other leading IT companies and web browser developers. All this means that HTML5 is becoming a mainstream of the Internet.... [Read the full story] |
Top 10 Points to Remember While Doing Web DevelopmentSep 17, 2010 - 6:44:25 AM The web developers have a vital role to play in the success of the online business as they are actual programmers of the web site. No one is going to fence on the fame of the web development in today’s competitive world. This is a high tech decade and you have to be on your toes all the time to contend well. The design of the website sets the tone for the success. If its attractive people would love it but if it’s not they are going to leave the page next moment.... [Read the full story] |
Top 5 PHP Frame Work List to speed up your Programming efficiencyJan 9, 2010 - 3:23:32 AM PHP is a widely used and open source scripting language which designed for web development to build dynamic web pages. PHP Applications are normally hosted or found on Linux Servers. Its functionality same as Windows platform by Active Server Pages Technology.... [Read the full story] |
Ethical Hacking for Strong SecurityJan 7, 2010 - 12:53:55 PM Ethical hacking is a process that utilizes the same techniques that malicious hackers use, but for the purpose of assessing security threats to your organization’s information assets. Entities of all types (private businesses, government agencies, non-profit corporations, Hospitals, Universities, Etc.) need strong IT security now more than ever. It is imperative that IT security personnel learn “Black Hat” (malicious) hacking techniques in order to counter or prevent attacks on critical IT systems and assets.... [Read the full story] |
Search for articles: |
Latest Articles in All Categories |
Putting Up a Small Commercial Printing Business |
So You Might Be Unemployed And Desire To Become A San Francisco Real Estate Investor Now |
Meditation and Mindfulness: Dealing With Emotion |
CPA Websites: Five Essential Ideas for Composing Convincing Articles |
Set Goals In Order to Come Up With Your Action Plan |
Is the Air in Your Home Safe to Breathe? |
Coarse Fishing Tackle Review: The JW Young 13ft Trotter Rod |
Section 1031 Exchanges For San Diego Real Estate Investors |
Phoenix Real Estate Investing For Highest Possible Earnings |
Legendary are the Volk Racing TE37 Wheels |
Developing the Next Generation Wall Station (ChaseDesk™) for Healthcare - A Case Study |
What are step down transformers? |
Introducing Sharehype, the Revolutionary Tool for Online Marketers |
Rewards To Shopping For Austin Real Estate On The Web |
Hydroponics for Beginners |
Would you like submit your articles and have them approved on a priority status? Find out more about how you can become a Priority author for pennies a day! Click here.
Dime-co.com Home |
|
|
|
|
|
|
|
|
|
|
|
|
|
Disclaimer: Dime-Co.Com is an online information article and video article network. All articles, video articles, comments, and other features herein are for informational purposes only and are provided "as is" without warranties, representations or guarantees of any kind. The views and opinions expressed in an article, comments, links or blogs are the author's own, and not necessarily those of dime-co.com's owners. For full disclaimer, please read our TOS.